Transient Analysis of Cyber-Attacks on Power SCADA using RTDS
##plugins.themes.academic_pro.article.main##
Abstract
##plugins.themes.academic_pro.article.details##
References
- Practical SCADA for Industry by David Bailey, Edwin Wright(pages 11 -17)
- Soumitra K. Ghosh, "Changing Role of SCADA in Manufacturing Plan" Industry Applications Conference 31st lAS Annual Meeting, lAS '96, 1999.
- Practical Modern SCADA Protocols:DNP3, 60870.5 and Related Systems. By Gordon Clarke, Deon Reynders (pages 17 -35
- Practical Modern SCADA Protocols:DNP3, 60870.5 and Related Systems. By Gordon Clarke, Deon Reynders (pages 46 -48)
- Dong-Joo Kang l, Hak-Man Kim, “Development of Test-bed and Security Devices for SCADA Communication in Electric Power System”, 'Korea Electrotechnology Research Institute, Incheon CityCollege.
- IEC standard for IEC 60870-5-101 protocol titled “Telecontrol equipment and systems - Part 5-101: Transmission protocols Companion standard for basic telecontrol tasks”.
- IEC standard for IEC 60870-5-104 protocol titled “Telecontrol equipment and systems - Part 5-104: Transmission protocols Network access for IEC 60870-5-101 using standard transport profiles”.
- Durga Samanth P, Rajesh Kalluri, Senthil Kumar R K., Bindhumadhava B.S.,“SCADA Communication Protocols: Vulnerabilities, Attacks and Possible Mitigations”, published in Journal, CSITransactions on ICT, June 2013, Volume 1, Issue 2 (pages 135-141).
- http://www.cert.org/information-for/ denial_of_service.cfm?
- https://www.classle.net/content-page/ connection-hijacking
- John T Hagen and Barry E. Mullins, “TCP veto: A novel network attack and its Application to SCADA protocols”, published in Innovative Smart Grid Technologies (ISGT), 2013 IEEE PES.
- IEC standard – IEC 62351-5 titled “Power systems management and associated information exchange - Data and communications security - Part 5: Security for IEC 60870-5 and derivatives”.